Computer Networks Theory Test
19 Questions
17 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Define the term 'network' in terms of computers and transmission media.

A network is a system of interconnected computers that communicate with each other over transmission media.

Define the term 'transmission media'.

Transmission media refers to the physical pathways through which data is transmitted from one location to another in a network.

List three types of transmission media.

Twisted pair cables, coaxial cables, fiber optic cables.

Define the term 'protocol'.

<p>A protocol is a set of rules or standards that define how data is transmitted and received over a network.</p> Signup and view all the answers

Name ONE type of real-world protocol not involving computers.

<p>Traffic signals.</p> Signup and view all the answers

Name TWO examples of computer network protocols.

<p>TCP/IP, HTTP.</p> Signup and view all the answers

Define the terms 'bandwidth' and 'latency' and explain how each is relevant in the speed of networks.

<p>Bandwidth definition: The maximum rate of data transfer across a network. Bandwidth relevance: A higher bandwidth allows for more data to be transmitted simultaneously, improving speed. Latency definition: The time taken for data to travel from the source to the destination. Latency relevance: Lower latency results in faster response times in network communications.</p> Signup and view all the answers

Explain the role of a network switch.

<p>A network switch connects devices within a local area network and filters data traffic to ensure efficient data transfer.</p> Signup and view all the answers

Explain the role of a router.

<p>A router connects multiple networks and directs data packets between them.</p> Signup and view all the answers

Explain the role of a wireless access point.

<p>A wireless access point allows wireless devices to connect to a wired network.</p> Signup and view all the answers

Explain the role of a firewall.

<p>A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules.</p> Signup and view all the answers

Explain two criteria that could be used for determining the reliability of a network.

<p>Uptime and error rate.</p> Signup and view all the answers

Explain the role of passwords in personal security.

<p>Passwords protect user accounts by requiring users to authenticate their identity before gaining access.</p> Signup and view all the answers

Explain how multi-factor authentication improves personal security.

<p>Multi-factor authentication enhances security by requiring users to provide multiple forms of verification.</p> Signup and view all the answers

Define the term encryption and its role in network security.

<p>Definition: Encryption is the process of converting information into a code to prevent unauthorized access. Role in network security: It secures data transmissions by making the information unreadable without the correct decryption key.</p> Signup and view all the answers

Explain how encryption is different from hashing.

<p>Encryption is reversible, allowing the original data to be retrieved with a key, while hashing is a one-way process that generates a fixed-size output from data without the ability to revert back.</p> Signup and view all the answers

Explain what a proxy is and TWO features which make them useful in computer networks.

<p>Definition: A proxy is an intermediary server that separates end users from the websites they browse. Feature 1: Caching improves performance by storing frequently accessed data. Feature 2: Anonymity enhances privacy by masking user IP addresses.</p> Signup and view all the answers

List THREE examples of network peripherals.

<p>Printer, scanner, external storage.</p> Signup and view all the answers

List THREE roles of Internet Service Providers (ISPs).

<p>Providing internet access, hosting websites, and offering email services.</p> Signup and view all the answers

Study Notes

Networking Fundamentals

  • A network consists of interconnected computers and transmission media, allowing data exchange and communication.
  • Transmission media refers to the physical pathways through which data signals travel, such as cables or wireless signals.

Types of Transmission Media

  • Twisted pair cables: Commonly used for telephone and data transmission.
  • Coaxial cables: Utilized in cable television and internet connections.
  • Fiber optic cables: Transmit data as light signals, offering high-speed transmission over long distances.

Protocols

  • A protocol is a set of rules or standards that dictate how data is transmitted over networks.
  • An example of a real-world protocol not involving computers is the traffic signal system.
  • Examples of computer network protocols include:
    • HTTP (HyperText Transfer Protocol): Governs the transmission of web pages.
    • TCP/IP (Transmission Control Protocol/Internet Protocol): Fundamental for internet communication.

Network Speed Metrics

  • Bandwidth is the maximum rate of data transfer across a network.
    • Relevant because it determines the amount of data that can be sent simultaneously, affecting overall speed.
  • Latency is the time delay in transmitting data from source to destination.
    • Relevant as higher latency can slow down response times, impacting user experience.

Network Hardware Roles

  • Network Switch: Directs data packets between devices on a local network, optimizing communication flow.
  • Router: Connects multiple networks and routes data between them, including internet access.
  • Wireless Access Point: Enables wireless devices to connect to a wired network, facilitating mobility.
  • Firewall: Protects networks by controlling incoming and outgoing traffic based on security rules.

Network Reliability Criteria

  • Uptime: Measures the availability of a network, expressed as a percentage of operational time.
  • Error Rate: Assesses the number of failed transmissions relative to successful ones, indicating reliability.

Personal Security Measures

  • Passwords serve as the first line of defense, protecting accounts and sensitive information from unauthorized access.
  • Multi-factor authentication enhances security by requiring multiple verification methods, making unauthorized access significantly harder.

Encryption in Network Security

  • Definition: The process of converting data into a coded format to prevent unauthorized access.
  • Role in network security: Ensures the confidentiality of information transmitted over networks, safeguarding it from eavesdropping.

Encryption vs. Hashing

  • Encryption is reversible, allowing the original data to be retrieved through decryption.
  • Hashing is a one-way process, creating a fixed-length output that cannot be reverted to the original input, primarily used for data integrity verification.

Proxy Servers

  • A proxy acts as an intermediary between clients and servers, facilitating requests.
  • Features that enhance usefulness:
    • Privacy Protection: Hides users' IP addresses, improving anonymity.
    • Content Filtering: Controls access to certain websites, enhancing security and productivity.

Network Peripherals

  • Examples include:
    • Printers: Devices that produce hard copies of documents from digital data.
    • Scanners: Convert physical documents into digital format.
    • External hard drives: Provide additional storage capacity and backup solutions.

Roles of Internet Service Providers (ISPs)

  • Provide access to the internet for individuals and organizations.
  • Facilitate email services, offering users email addresses and accounts.
  • Offer customer support for connectivity issues and technical assistance.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz assesses your understanding of computer networks. Define key terms and concepts related to networking fundamentals. It is essential for students studying computer science and information technology.

More Like This

Use Quizgecko on...
Browser
Browser